By Roy, on May 4th, 2016

This May in Chicago Illinois Microsoft will launch for the first time the Ignite conference. consolidating all the following events- Microsoft Exchange, Lync, Project, SharePoint, MMS, or TechEd conferences. It’s going be “the” event of the year for IT professionals, offering keynote speakers such as Microsoft’s CEO Satya Nadella and hundreds of sessions in different topics.

 

CalCom as a Microsoft ECA (Enterprise Cloud Alliance) partner will present its’ server hardening and compliance solution for SCOM as an exhibitor.

 

Last week Microsoft revealed the final agenda and session list for the Ignite conference, we were happy to see some highly interesting cloud/application/server security sessions and most important we would like to leverage two hardening sessions. We are pleased to see that Microsoft like dozens of our customers understand the importance of infrastructure hardening  in today’s’ emerging cyber threat landscape.

 

 

Here is a list of the top security and hardening sessions at Microsoft Ignite:

 

 

Harden the Fabric: Protecting Tenant Secrets in Hyper-V

 

In today’s environments, hosters need to provide security assurance to their tenants. “Harden the fabric” is a Windows Server and Microsoft System Center vNext scenario, which includes enhancements in Hyper-V, Virtual Machine Manager, and a new Guardian Server role that enables shielded VMs. Technologies which ensure that host resources do not have access to the Virtual Machine or data.

 

Modern Hardening: Lessons Learned on Hardening Applications and Services

 

Come join Microsoft Cybersecurity team members for a discussion of hardening applications, services, service accounts, and management tools to protect customer environments against compromise by determined adversaries. We discuss our experiences and the tools, models, and frameworks we have used to mitigate these risks, and share our lessons learned.

 

 

Inside Microsoft Azure Cloud Security

 

Microsoft uses the three classic pillars in its Azure security strategy: Protect. Defend. Respond. This session describes them from an insider’s perspective with first-hand examples of how Azure uses isolation and Just-in-Time access to protect against compromised users, penetration tests live services and leverages analytics to detect malicious activities, and integrates data sharing to rapidly respond to incidents.

 

 

Administrator’s Mandatory Check List: The Ultimate Guide to Securing Your Infrastructure

 

While data leaks may not have been high on the agenda lately, a series of recent, and now infamous, high-profile security incidents have quickly brought them to the forefront. It’s clear that we have a smart new generation of hackers who understand computer systems—some doing it for fun, others with a slightly more sinister intent. Are these targeted attacks, or just for a good time, and by accident they’re discovering something useful? Usually the accidental hacker’s goal is simple: do whatever is possible. To fully understand how to approach securing your infrastructure without going to the ‘dark side’, it’s good to imagine the points of entry that can be used by employees. Pre-Day Session presenter: Paula Januszkiewicz

 

 

See you at Ignite!